OWASP

Results: 546



#Item
351Nicholas J. Percoco / Cyberwarfare / Computer security / Electronic commerce / Data security / Data breach / Security / Computer network security / Secure communication

Trustwave - SpiderLabs[removed]Global Security Report - 4 by 3 - FINAL.pptx

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 22:15:57
352

Scannen des gesamten IPv4 WWW Prof. Dr.-Ing. Sebastian Schinzel Email: Web: Twitter:

Add to Reading List

Source URL: www.owasp.org

Language: German - Date: 2014-12-13 17:42:29
    353

    Risk Analysis and Measurement with CWRAF - Common Weakness Risk Analysis Framework - April 4, 2012

    Add to Reading List

    Source URL: www.owasp.org

    - Date: 2012-04-18 22:14:49
      354Computer security / Actuarial science / Ethics / Risk management / Vulnerability / CVSS / IT risk management / Management / Risk / Security

      PCI VERSION 2.0 AND RISK MANAGEMENT Doug Landoll, CISSP, CISA, QSA, MBA Practice Director Risk and Compliance Management

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-04-10 12:45:06
      355Computing / Cross-site request forgery / OWASP / Cross-site scripting / Web application security / Vulnerability / Application security / Aggregate / WebScarab / Cyberwarfare / Computer security / Computer network security

      OWASP Top[removed]Dave Wichers OWASP Top 10 Project Lead OWASP Board Member COO/Cofounder, Aspect Security

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2014-01-03 09:41:55
      356Cyberwarfare / Computing / Computer security / Web application security / Application security / Computer network security / Security / OWASP

      OWASP - Sponsorship Opportunities - EN V.1.2

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2011-12-11 14:42:52
      357Security / Data security / OWASP / Software testing / Application security / Web application security / Vulnerability management / Vulnerability / Threat model / Computer security / Computer network security / Cyberwarfare

      -[removed] The OWASP Application Security Code of Conduct for Development Organizations

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2013-03-27 15:21:14
      358Computer security / Supply chain management / Management / Software testing / Threat / Malware / Counterfeit / Supply chain risk management / Vulnerability / Business / Cyberwarfare / Computer network security

      Supply Chain Risk Management and the Software Supply Chain Karen Mercedes Goertzel, CISSP Lead Associate Booz Allen Hamilton

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2011-12-11 14:42:17
      359Computing / Security / OWASP / Software testing / Web application security / Application security / Application firewall / Cross-site request forgery / Vulnerability / Computer security / Cyberwarfare / Computer network security

      OWASP AppSec Resarch 2013 Conference http://www.owasp.org/index.php/AppSecEU2013 WASC/OWASP WAFEC From industry to community project

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2013-08-26 18:02:53
      360

      Using PHPIDS to Understand Attacks Trends @grecs

      Add to Reading List

      Source URL: www.owasp.org

      - Date: 2012-04-18 21:58:49
        UPDATE